K

K28.5

[Fibre Channel] A special 10-bit character used to indicate the beginning of a Fibre Channel command.

Kb
Kbit

[General] Abbreviations for Kilobit.

KB
KByte

[General] Abbreviations for Kilobyte.

key

[Data Security] A sequence of bits used for cryptographic operations and/or for producing other keys.

The same plaintext encrypted with different keys yields different ciphertexts, each of which requires a different key for decryption. In a symmetric cryptosystem the encryption and decryption keys are the same. In an asymmetric cryptosystem the encryption and decryption keys are different.

key backup

[Data Security] A process used in a cryptographic system that can restore access to data by providing for key deposit and recovery.

Key backup is sometimes used as a replacement term for key escrow, which has become encumbered with additional meanings.

key escrow

[Data Security] A process in which the storage of a cryptographic key is entrusted to a third party escrow agent who will disclose it only to the owner or another authorized user.

Key escrow systems are used to ensure that access to encrypted data can be restored in case of key loss due to error, disaster or a malicious act.

key exchange

[Data Security] A cryptographic protocol and procedure in which two communicating entities determine a shared key in a fashion such that a third party who reads all of their communication cannot effectively determine the value of the key.

A common approach to key exchange requires such a third party to compute a discrete logarithm over a large field in order to determine the key value, and relies for its security on the computational intractability of the discrete logarithm problem.

key management

[Data Security] The supervision and control of the process by which keys are generated, stored, protected, transferred, loaded, used, revoked and destroyed.

Key Management Interoperability Protocol (KMIP)

[Data Security] An OASIS standard that establishes a single, comprehensive protocol for communication between enterprise key management servers and cryptographic clients.

 

key pair

[Data Security] A public key and its corresponding private key as used in public key cryptography (i.e., asymmetric cryptosystems).

key recovery

[Data Security] A system characterized by the presence of some mechanism for obtaining exceptional access to a cryptographic key in case of loss by error, disaster, or malicious intent.

See also key escrow.

key wrapping

[Data Security] A method of encrypting keys (along with associated integrity information) that provides both confidentiality and integrity protection using a symmetric key. [NIST SP 800-57 Part 1]

keying material

[Data Security] A key or authentication information in physical or magnetic form.

KiB
KiByte

[General] Shorthand for Kibibyte.

Kibibit (Kibit)

[General] Shorthand for 1,024 (210) bits.

Binary notation is most commonly used for semiconductor memory sizes.

See also Kilobit.

Kibibyte (KiB)

[General] Shorthand for 1,024 (210) bytes.

Binary notation is most commonly used for semiconductor memory sizes.

See also Kilobyte.

Kibit

[General] Shorthand for Kibibit.

Kilobit (Kb)

[General] 1,000 (103) bytes.

The SNIA uses the base 10 convention commonly found in I/O-related and scientific literature rather than the base 2 convention (1,024, or 210) common in computer system and software literature.

See also Kibibit.

Kilobyte (KB)

[General] 1,000 (103) bytes.

The SNIA uses the base 10 convention commonly found in I/O-related and scientific literature rather than the base 2 convention (1,024, or 210) common in computer system and software literature.

See also Kibibyte.

KMIP

[Data Security] Acronym for Key Management Interoperability Protocol.

Social and MultiMedia


Videos

Webcasts

Blog

Podcasts

        SNIA on Facebook   SNIA on Twitter   SNIA on LinkedIn

Login




Forgot your password? Is your company a member?
Get your login here!
Nonmembers join here

Event Calendar

S M T W T F S
 
 
 
 
 
 
1
 
2
 
3
 
4
 
5
 
6
 
7
 
8
 
9
 
10
 
11
 
12
 
13
 
14
 
15
 
16
 
17
 
18
 
19
 
20
 
21
 
22
 
23
 
24
 
25
 
26
 
27
 
28
 
29
 
30
 
 
 
 
 
 
 

Featured Events

View Upcoming Schedule of SNIA Participating Events>

Subscribe to our Newsletter